Phishing simulation · Awareness testing · Social engineering

Does anyone on your team click?

We send realistic phishing emails to your employees — and you see who clicks, who enters their credentials, and who reports it. From a simple awareness check to targeted spear-phishing campaigns against specific departments or executives.

GDPR-compliant, no real data stored Results within 48 hours Free initial consultation
inbox — phishing-simulation
From: it-support@your-company-co.com
⚠ Urgent: Your password expires in 24h
→ Renew password now
Simulated phishing email · Not a real attack
91%
of all cyberattacks start with a phishing email
∅ 68 sec.
until the first click after sending
1 in 3
employees click on realistic phishing emails
−65%
click rate after regular simulations
Why this matters

Technical security means nothing if someone simply clicks

Firewalls, EDR, and SIEM protect against automated attacks. But an employee who clicks a link and enters their credentials bypasses all of that in seconds — and no system raises an alarm. Phishing is the most common entry point for ransomware, data theft, and CEO fraud.

No log, no alert

A click on a phishing link generates no security alert in most environments. The attacker is inside the network before anyone notices.

Credentials = master key

Anyone who harvests credentials needs no exploits. With a valid VPN login or O365 account, the entire IT environment is open.

Regulatory obligation

NIS2, ISO 27001, TISAX, and DORA require regular awareness testing. Our report is directly usable as a compliance document.

Culture beats technology

Awareness training without prior testing is flying blind. Only when you know where the gaps are can you train in a targeted way.

Simulation scenarios

From a simple campaign to targeted spear phishing

We tailor every simulation to your environment, language, and tool landscape. The more realistic the email, the more meaningful the result.

Standard phishing campaign

Mass send to all or selected employees. Realistic senders like IT support, Microsoft, a courier service, or your own organisation. Ideal for the first awareness check and an overview of overall click rates.

Entry level · Overview · Benchmark

CEO fraud & payment fraud

A simulated payment request or urgent message from the board — classic business email compromise. We test whether processes like dual control and callback requirements are actually followed in practice.

Finance · Accounting · Management

Attachment & macro simulation

Word documents, Excel files, or PDFs with simulated macros or links — we measure who opens attachments and how many confirm execution. No real malicious code, but full tracking.

Office · PDF · Macros

Combined campaign

Phishing email → fake login page → credential capture → simulated lateral move. The complete attack chain shows how far a real attacker can get after the first click.

Full chain · Red team · DORA
What we measure

Every click counts — we track everything

Our simulation does not just measure who clicks the link. We capture every step of the attack chain and give you a complete picture of the risk.

Open rate

Who actually opened the email? Important for assessing the effectiveness of the subject line.

Click rate

Who clicked the link or attachment? The central metric of every simulation.

Credential entry

Who entered their username and password on the fake login page? The real data breach risk.

Report rate

Who flagged the email as suspicious? This is the most important metric for your security culture.

Department breakdown

Where are the high-risk groups? Finance, procurement, executives — we deliver the drill-down.

Time pattern

When did people click? In the morning, under time pressure, just before the end of the day — patterns become visible.

Our approach

From briefing to report — in 5 steps

A phishing simulation is not a tool rollout — it is a manually planned test. We tailor every step to your organisation.

STEP 01

Briefing & scope

Which departments? Which scenarios? Which systems will be simulated? We jointly define scope, target groups, exclusions, and legal parameters.

STEP 02

Campaign development

We develop the phishing emails, sender domains, landing pages, and tracking infrastructure — custom-built for your environment and language.

STEP 03

Execution

Sending follows the agreed schedule. We monitor the campaign in real time and escalate immediately if unexpected reactions occur.

STEP 04

Analysis

Complete analysis of all tracking data: click rates, credential entries, report rates — broken down by department, location, and scenario.

STEP 05

Report & recommendations

Audit-ready report with industry benchmark, risk groups, concrete remediation recommendations, and management summary. Directly usable for NIS2, ISO 27001, and DORA.

31%
overall click rate
14%
credential entry rate
8%
report rate (target: >60%)
∅ 27%
industry benchmark click rate
Phishing report · Acme Ltd · Q1 2025 Analysis ✓
Overall click rate
31%
Credential entry (fake login)
14%
Highest risk group
Finance 48%
Report rate (correctly identified)
8%
Industry benchmark (∅)
27%
Priority 1 recommendation
Phishing reporting process
Breakdown by department available All data anonymised · GDPR-compliant
NIS2 Art. 21 — Awareness measures · ISO 27001 A.6.3 — Training · DORA Art. 25 — Regular testing · TISAX VDA ISA 1.x — ISMS · BSI Grundschutz ORP.3
Frequently asked questions

Phishing simulation — your questions answered

Yes — that is actually the point. An announced phishing simulation only measures caution immediately after the announcement, not everyday behaviour. This is legally permissible when the simulation is run as an anonymised organisational measure and no personal data is stored without a legal basis. We clarify the legal parameters together with you — including coordination with the works council if required.
After clicking, the employee lands on a page we control — either a blank warning page ('This was a test.') or, if desired, a convincingly real login form to measure credential entry. No real data is stored or misused. Optionally, we display a short awareness message to the employee immediately after the click.
Very realistic — that is the key difference from standard awareness tools. We develop the emails manually, research your tool landscape, language, and current projects via OSINT, and build scenarios that feel like genuine internal communications. Generic demo spam from toolkit templates is unsuitable for serious simulations.
No — this is a fundamental condition for us. We deliver all results anonymised at department or group level, never with individual names. The goal is to identify systemic gaps, not to sanction individuals. An employee who clicks in the test has fulfilled the purpose of the test — they have made a real vulnerability visible.
Awareness platforms deliver automated mass simulations from template libraries. Our approach is manual and individual: we develop scenarios specifically for your organisation, simulate spear phishing against individuals, and deliver an audit-ready report — not a dashboard subscription. For compliance evidence and red-team-adjacent simulations, this is the decisive difference.
Yes — and that is the gold standard. Phishing email → credential entry → physical access with the stolen data → lateral move through the network. This combined attack chain shows how far a real attacker can get after the first click. We build such full-chain scenarios on request.
At least once a year for compliance evidence. Two to four simulations per year with different scenarios are recommended to keep awareness permanently high. In practice we see click rates drop by up to 65% within 6 months after a simulation and targeted training.

© AccessGranted X GmbH